{"id":3808,"date":"2019-04-08T11:05:00","date_gmt":"2019-04-08T11:05:00","guid":{"rendered":"http:\/\/the-codest.localhost\/blog\/web-app-security-target_blank-vulnerability\/"},"modified":"2026-04-27T09:54:29","modified_gmt":"2026-04-27T09:54:29","slug":"vefumsoknaroryggi-markmid-tom-veikleiki","status":"publish","type":"post","link":"https:\/\/thecodest.co\/is\/blog\/web-app-security-target-blank-vulnerability\/","title":{"rendered":"\u00d6ryggi vefums\u00f3kna. Veikleiki Target=\u201d_blank\u201d"},"content":{"rendered":"\n<p>Recently, we have written about <strong><a href=\"https:\/\/thecodest.co\/blog\/web-app-security-xss-vulnerability\/\">web application security when it comes to XSS vulnerability<\/a><\/strong>. This time we want to pay your attention to another danger.<\/p>\n\n\n\n<p>The vulnerability discussed in this paper has been with <a href=\"https:\/\/thecodest.co\/is\/blog\/why-us-companies-are-opting-for-polish-developers\/\">us<\/a> for a long time and due to its simplicity, it is often underestimated or even unknown by some <strong><a href=\"https:\/\/thecodest.co\/careers\">web application developers<\/a><\/strong>.<\/p>\n\n\n\n<p>Almost every <a href=\"https:\/\/thecodest.co\/is\/blog\/find-your-ideal-stack-for-web-development\/\">web<\/a> application contains links that, when clicked upon, open in a new tab so as not to close the tab with the original page. This is a preferred behavior because the creators want the user to spend as much time in the application as possible.<\/p>\n\n\n\n<p>An attack that exploits this vulnerability is the so-called &#8220;reverse tabnabbing.&#8221; It is an attack where a page linked from the target page is able to replace that page with, for example, a phishing site.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Attack scenario<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Suppose the victim uses Facebook which is known for opening links via target=&#8221;_blank&#8221;,<\/li>\n\n\n\n<li>Create a fake viral page,<\/li>\n\n\n\n<li>Create a phishing website that looks like Facebook sign-in page,<\/li>\n\n\n\n<li>Put the below <a href=\"https:\/\/thecodest.co\/is\/dictionary\/what-is-code-refactoring\/\">code<\/a> on the viral page e.g., via found XSS vulnerability<br><code>window.opener.location = 'https:\/\/phishing-website\/facebook.com';<\/code><\/li>\n\n\n\n<li>The victim clicks on the link on Facebook to the viral page,<\/li>\n\n\n\n<li>The viral page redirects the Facebook tab to the phishing website asking the user to sign in again.<\/li>\n<\/ol>\n\n\n\n<p>So, we can change the parent tab from infected target page by window object from Web <a href=\"https:\/\/thecodest.co\/is\/blog\/compare-staff-augmentation-firms-that-excel-in-api-team-staffing-for-financial-technology-projects\/\">API<\/a>. Typically, an attack involves using several discovered vulnerabilities and phishing scams in parallel.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The problem<\/h2>\n\n\n\n<p>When we open a new tab in the browser using a link with the <code>target=\"_blank\"<\/code> attribute, we have access to our &#8220;referrer&#8221; from the new tab. More specifically, to the <code>opener<\/code> property of the <code>Window<\/code> object, which returns a reference to the window that opened it, our parent page.<\/p>\n\n\n\n<p>This is due to the behavior of the <code>Window.open()<\/code> function. With access to this attribute, we can easily replace our parent page. Note that some modern browsers can make <code>window.opener<\/code> function in target tab as <code>null<\/code> to prevent this behavior.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Example code<\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code class=\"\"><code> &lt;a href=\"https:\/\/github.com\" target=\"_blank\">Go to GitHub - infected link&lt;\/a><\/code>\n<code>const\n if (link)\n   link[0].onclick = () => {\n     if (window) window.opener.location = 'https:\/\/stackoverflow.com'\n   }<\/code><\/code><\/pre>\n\n\n\n<p>Above you can see the infected link which originally opens a new tab with a GitHub page but meanwhile it changes our &#8220;parent&#8221; page to Stackoverflow site.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Live example<\/h2>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-codesandbox wp-block-embed-codesandbox\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" title=\"target=&quot;_blank&quot; vulnerability\" width=\"500\" height=\"750\" src=\"https:\/\/codesandbox.io\/embed\/targetblank-vulnerability-r8uij#?secret=554ULm7unj\" data-secret=\"554ULm7unj\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><b>1. HTML links<\/b><\/p>\n\n\n\n<p>Add <code>rel=\"noopener noreferrer\"<\/code> to the <code>&lt;a&gt;<\/code> tag.<\/p>\n\n\n\n<p>The <code>rel<\/code> attribute defines the relationship between a linked resource and the current document.<\/p>\n\n\n\n<p><code>noopener<\/code> tells the browser to navigate to the target without granting access to the parent that opened it. Target tab <code>Window.opener<\/code> will be <code>null<\/code>.<\/p>\n\n\n\n<p><code>noreferrer<\/code> prevents the browser, when navigating to target, to send to the parent the address or any other value as referrer via the <code>referer<\/code> HTTP header. Note that this HTTP header name is intentionally misspelled as &#8220;referrer.&#8221;<\/p>\n\n\n\n<p><b>2. <a href=\"https:\/\/thecodest.co\/is\/blog\/hire-javascript-developer\/\">JavaScript<\/a> links<\/b><\/p>\n\n\n\n<p>For the JavaScript <code>Window.open<\/code> function, you can add the values <code>noopener<\/code> and <code>noreferrer<\/code> in the <code>windowFeatures<\/code> parameter of the <code>Window.open<\/code> function but different browsers may respond differently so it is recommended to make <code>Window.opener<\/code> as <code>null<\/code> after using <code>Window.open()<\/code> function.<\/p>\n\n\n\n<p><b>Read more<\/b>:<\/p>\n\n\n\n<p><a href=\"https:\/\/thecodest.co\/blog\/rails-api-cors-dash-of-consciousness\">Rails API &amp; CORS. A dash of consciousness<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/thecodest.co\/blog\/data-fetching-strategies-in-nextjs\/\">Data fetching strategies in NextJS<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/thecodest.co\/blog\/7-reasons-why-your-online-shop-needs-magento\/\">7 Reasons Why Your Online Shop Needs Magento<\/a><\/p>\n\n\n\n<p><b>If you find this article interesting, follow Lukasz on Github: <a href=\"https:\/\/github.com\/twistezo\">https:\/\/github.com\/twistezo<\/a><\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Notkun vefums\u00f3kna hefur or\u00f0i\u00f0 algeng \u00ed \u00f6llum samf\u00e9l\u00f6gum. Vi\u00f0 h\u00f6fum samskipti vi\u00f0 \u00fe\u00e6r \u00e1 hverjum degi. M\u00e1 segja a\u00f0 \u00fe\u00e6r umlyndi okkur. Vi\u00f0 notum \u00fe\u00e6r \u00ed vinnu, til af\u00fereyingar og sem t\u00e6ki til a\u00f0 eiga samskipti vi\u00f0 a\u00f0ra. Oft, b\u00e6\u00f0i sem notendur og sem forritarar, gerum vi\u00f0 okkur ekki grein fyrir hve margar \u00f6ryggisgallar finnast daglega \u00ed sl\u00edkum forritum.<\/p>","protected":false},"author":2,"featured_media":3809,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-3808","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-software-development"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Web app security. Target=&quot;_blank&quot; vulnerability - The Codest<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thecodest.co\/is\/blogg\/vefumsoknaroryggi-markmid-tom-veikleiki\/\" \/>\n<meta property=\"og:locale\" content=\"is_IS\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Web app security. Target=&quot;_blank&quot; vulnerability\" \/>\n<meta property=\"og:description\" content=\"Using web applications has become commonplace for every society. We deal with them every day. We can say that they surround us. We use them at work, for entertainment and as tools for communicating with others. Often, as users and as developers, we do not realize how many security vulnerabilities are discovered every day in such applications.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thecodest.co\/is\/blogg\/vefumsoknaroryggi-markmid-tom-veikleiki\/\" \/>\n<meta property=\"og:site_name\" content=\"The Codest\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-08T11:05:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-27T09:54:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/web-app-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"thecodest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"thecodest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-target-blank-vulnerability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-target-blank-vulnerability\\\/\"},\"author\":{\"name\":\"thecodest\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#\\\/schema\\\/person\\\/7e3fe41dfa4f4e41a7baad4c6e0d4f76\"},\"headline\":\"Web app security. Target=&#8221;_blank&#8221; vulnerability\",\"datePublished\":\"2019-04-08T11:05:00+00:00\",\"dateModified\":\"2026-04-27T09:54:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-target-blank-vulnerability\\\/\"},\"wordCount\":516,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-target-blank-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/05\\\/web-app-security.png\",\"articleSection\":[\"Software Development\"],\"inLanguage\":\"is\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-target-blank-vulnerability\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-target-blank-vulnerability\\\/\",\"url\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-target-blank-vulnerability\\\/\",\"name\":\"Web app security. Target=\\\"_blank\\\" vulnerability - The Codest\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-target-blank-vulnerability\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-target-blank-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/05\\\/web-app-security.png\",\"datePublished\":\"2019-04-08T11:05:00+00:00\",\"dateModified\":\"2026-04-27T09:54:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-target-blank-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"is\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-target-blank-vulnerability\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"is\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-target-blank-vulnerability\\\/#primaryimage\",\"url\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/05\\\/web-app-security.png\",\"contentUrl\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/05\\\/web-app-security.png\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-target-blank-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/thecodest.co\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Web app security. Target=&#8221;_blank&#8221; vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#website\",\"url\":\"https:\\\/\\\/thecodest.co\\\/\",\"name\":\"The Codest\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/thecodest.co\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"is\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#organization\",\"name\":\"The Codest\",\"url\":\"https:\\\/\\\/thecodest.co\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"is\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/03\\\/thecodest-logo.svg\",\"contentUrl\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/03\\\/thecodest-logo.svg\",\"width\":144,\"height\":36,\"caption\":\"The Codest\"},\"image\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/pl.linkedin.com\\\/company\\\/codest\",\"https:\\\/\\\/clutch.co\\\/profile\\\/codest\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#\\\/schema\\\/person\\\/7e3fe41dfa4f4e41a7baad4c6e0d4f76\",\"name\":\"thecodest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"is\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g\",\"caption\":\"thecodest\"},\"url\":\"https:\\\/\\\/thecodest.co\\\/is\\\/author\\\/thecodest\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u00d6ryggi vefums\u00f3kna. Veikleiki Target=\"_blank\" - The Codest","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thecodest.co\/is\/blogg\/vefumsoknaroryggi-markmid-tom-veikleiki\/","og_locale":"is_IS","og_type":"article","og_title":"Web app security. Target=\"_blank\" vulnerability","og_description":"Using web applications has become commonplace for every society. We deal with them every day. We can say that they surround us. We use them at work, for entertainment and as tools for communicating with others. Often, as users and as developers, we do not realize how many security vulnerabilities are discovered every day in such applications.","og_url":"https:\/\/thecodest.co\/is\/blogg\/vefumsoknaroryggi-markmid-tom-veikleiki\/","og_site_name":"The Codest","article_published_time":"2019-04-08T11:05:00+00:00","article_modified_time":"2026-04-27T09:54:29+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/web-app-security.png","type":"image\/png"}],"author":"thecodest","twitter_card":"summary_large_image","twitter_misc":{"Written by":"thecodest","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/thecodest.co\/blog\/web-app-security-target-blank-vulnerability\/#article","isPartOf":{"@id":"https:\/\/thecodest.co\/blog\/web-app-security-target-blank-vulnerability\/"},"author":{"name":"thecodest","@id":"https:\/\/thecodest.co\/#\/schema\/person\/7e3fe41dfa4f4e41a7baad4c6e0d4f76"},"headline":"Web app security. Target=&#8221;_blank&#8221; vulnerability","datePublished":"2019-04-08T11:05:00+00:00","dateModified":"2026-04-27T09:54:29+00:00","mainEntityOfPage":{"@id":"https:\/\/thecodest.co\/blog\/web-app-security-target-blank-vulnerability\/"},"wordCount":516,"commentCount":0,"publisher":{"@id":"https:\/\/thecodest.co\/#organization"},"image":{"@id":"https:\/\/thecodest.co\/blog\/web-app-security-target-blank-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/web-app-security.png","articleSection":["Software Development"],"inLanguage":"is","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/thecodest.co\/blog\/web-app-security-target-blank-vulnerability\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/thecodest.co\/blog\/web-app-security-target-blank-vulnerability\/","url":"https:\/\/thecodest.co\/blog\/web-app-security-target-blank-vulnerability\/","name":"\u00d6ryggi vefums\u00f3kna. Veikleiki Target=\"_blank\" - The Codest","isPartOf":{"@id":"https:\/\/thecodest.co\/#website"},"primaryImageOfPage":{"@id":"https:\/\/thecodest.co\/blog\/web-app-security-target-blank-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/thecodest.co\/blog\/web-app-security-target-blank-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/web-app-security.png","datePublished":"2019-04-08T11:05:00+00:00","dateModified":"2026-04-27T09:54:29+00:00","breadcrumb":{"@id":"https:\/\/thecodest.co\/blog\/web-app-security-target-blank-vulnerability\/#breadcrumb"},"inLanguage":"is","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thecodest.co\/blog\/web-app-security-target-blank-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"is","@id":"https:\/\/thecodest.co\/blog\/web-app-security-target-blank-vulnerability\/#primaryimage","url":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/web-app-security.png","contentUrl":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/web-app-security.png","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/thecodest.co\/blog\/web-app-security-target-blank-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thecodest.co\/"},{"@type":"ListItem","position":2,"name":"Web app security. Target=&#8221;_blank&#8221; vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/thecodest.co\/#website","url":"https:\/\/thecodest.co\/","name":"The Codest","description":"","publisher":{"@id":"https:\/\/thecodest.co\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thecodest.co\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"is"},{"@type":"Organization","@id":"https:\/\/thecodest.co\/#organization","name":"The Codest","url":"https:\/\/thecodest.co\/","logo":{"@type":"ImageObject","inLanguage":"is","@id":"https:\/\/thecodest.co\/#\/schema\/logo\/image\/","url":"https:\/\/thecodest.co\/app\/uploads\/2024\/03\/thecodest-logo.svg","contentUrl":"https:\/\/thecodest.co\/app\/uploads\/2024\/03\/thecodest-logo.svg","width":144,"height":36,"caption":"The Codest"},"image":{"@id":"https:\/\/thecodest.co\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/pl.linkedin.com\/company\/codest","https:\/\/clutch.co\/profile\/codest"]},{"@type":"Person","@id":"https:\/\/thecodest.co\/#\/schema\/person\/7e3fe41dfa4f4e41a7baad4c6e0d4f76","name":"thecodest","image":{"@type":"ImageObject","inLanguage":"is","@id":"https:\/\/secure.gravatar.com\/avatar\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g","caption":"thecodest"},"url":"https:\/\/thecodest.co\/is\/author\/thecodest\/"}]}},"_links":{"self":[{"href":"https:\/\/thecodest.co\/is\/wp-json\/wp\/v2\/posts\/3808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecodest.co\/is\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecodest.co\/is\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecodest.co\/is\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thecodest.co\/is\/wp-json\/wp\/v2\/comments?post=3808"}],"version-history":[{"count":4,"href":"https:\/\/thecodest.co\/is\/wp-json\/wp\/v2\/posts\/3808\/revisions"}],"predecessor-version":[{"id":8430,"href":"https:\/\/thecodest.co\/is\/wp-json\/wp\/v2\/posts\/3808\/revisions\/8430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thecodest.co\/is\/wp-json\/wp\/v2\/media\/3809"}],"wp:attachment":[{"href":"https:\/\/thecodest.co\/is\/wp-json\/wp\/v2\/media?parent=3808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecodest.co\/is\/wp-json\/wp\/v2\/categories?post=3808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecodest.co\/is\/wp-json\/wp\/v2\/tags?post=3808"}],"curies":[{"name":"vp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}